Access Management , COVID-19 , Governance & Risk Management

Cybersecurity Leadership: Defining the 'New Now'

CEOs and CISOs on Identity, Visibility and Why There's No Turning Back
Clockwise from top left: Andre Durand, Ping Identity; Jelena Zelenovic Matone, European Investment Bank; Cris Ewell, UW Medicine; Paul Hooper, Gigamon; Mitch Parker, Indiana University Health; Troels Oerting, World Economic Forum

Four CISOs, two CEOs, one global crisis. These are the ingredients for an exclusive panel discussion on how enterprises have emerged from the cybersecurity challenges of COVID-19 and how they are building the foundation for an entirely new way to live and work post-pandemic.

See Also: Core Elements of Modern Workforce Identity Security

Participating in this cybersecurity leadership forum are:

  • CISOs: Troels Oerting, chairman of the board of World Economic Forum Center for Cybersecurity; Jelena Zelenovic Matone, senior head, op. risk, and CISO, European Investment Bank; Cris Ewell, CISO, UW Medicine; Mitch Parker, CISO, Indiana University Health.
  • CEOS: Paul Hooper, CEO, Gigamon; Andre Durand, CEO, Ping Identity.

In this wide-ranging video discussion with Information Security Media Group, the panel discusses a variety of strategic cybersecurity issues, including:

  • Identity, visibility and other challenges for their enterprises, teams and customers;
  • How the crisis has changed how they work and communicate with their constituents;
  • Their vision of the “new now” and what that means for remote work, identity and access management and other challenges.

Oerting, former group CISO at Barclays, has chaired the EU Financial Cybercrime Coalition, of which most banks are partners, and has extensive experience in cybersecurity. Since 2018, he has been head of the Center for Cybersecurity, World Economic Forum.

Zelenovic Matone has 15 years of professional experience in information security, governance, audit, risk mitigation and implementation of best practices for large multilateral private and public sectors with global presence. She currently is senior head of operational and cybersecurity risk and heads information security at European Investment Bank.

Ewell, PhD, is CISO at University of Washington Medicine. Previously, he was CISO of Seattle Children's Hospital. Before that, he served as the director of information security operations at the University of Washington, chief security officer for PEMCO Corp. and chief technology officer for Breakwater Security.

Parker is the executive director of information security and compliance at Indiana University Health. His areas of interest include improving security governance, regulatory compliance, and working with a large variety of customers to address their business needs and incorporate risk management into all aspects of the business process.

Hooper is a networking and high-tech industry veteran that has held key positions at Gigamon including CMO and vice president of marketing and product management before his appointment as CEO in 2012. He has held a broad range of leadership positions in marketing, product development, business management and information technology at Extreme Networks, myCFO, Inc., JDS Uniphase, Netscape Communications and Sun Microsystems.

In addition to founding Ping Identity, in the past 20 years, Durand has founded and grown a number of other successful software companies. That includes Durand Communications, an online photograph database and Windows NT client/server bulletin board, which was later sold to Webb Interactive, and also the Jabber instant messaging open source platform, which was sold to Cisco in 2008.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.